Which protocol does an access point use to draw power from a connected switch?

Which protocol does an access point use to draw power from a connected switch?A . Internet Group Management ProtocolB . Cisco Discovery ProtocolC . Adaptive Wireless Path ProtocolD . Neighbor Discovery ProtocolView AnswerAnswer: B

September 22, 2021 No Comments READ MORE +

Which access layer threat-mitigation technique provides security based on identity?

Which access layer threat-mitigation technique provides security based on identity?A . using a non-default native VLANB . Dynamic ARP InspectionC . DHCP snoopingD . 802.1xView AnswerAnswer: D

September 22, 2021 No Comments READ MORE +

Which command set meets the requirement?

Refer to the exhibit. An administrator must turn off the Cisco Discovery Protocol on the port configured with last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?A . interface gi0/1 no cdp enableB . interface gi0/1 clear cdp tableC . interface gi0/0 no cdp runD ....

September 22, 2021 No Comments READ MORE +

Which command must be executed for Gi1/1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?

Refer to the exhibit. Which command must be executed for Gi1/1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?A . switchport mode trunkB . switchport mode dot1-tunnelC . switchport mode dynamic autoD . switchport mode dynamic desirableView AnswerAnswer: D

September 22, 2021 No Comments READ MORE +

What are network endpoints?

What are network endpoints?A . a threat to the network if they are compromisedB . support inter-VLAN connectivityC . act as routers to connect a user to the service prowler networkD . enforce policies for campus-wide traffic going to the internetView AnswerAnswer: A

September 22, 2021 No Comments READ MORE +

What is a characteristic of cloud-based network topology?

What is a characteristic of cloud-based network topology?A . physical workstations are configured to share resourcesB . services are provided by a public, private, or hybrid deploymentC . onsite network services are provided with physical Layer 2 and Layer 3 componentsD . wireless connections provide the sole access method to...

September 21, 2021 No Comments READ MORE +

Which two primary drivers support the need for network automation? (Choose two)

Which two primary drivers support the need for network automation? (Choose two)A . Increasing reliance on self-diagnostic and self-healingB . Eliminating training needsC . Policy-derived provisioning of resourcesD . Reducing hardware footprintE . Providing a ship entry point for resource provisioningView AnswerAnswer: C E

September 21, 2021 No Comments READ MORE +

Which QoS tool can you use to optimize voice traffic on a network that is primarily intended for data traffic?

Which QoS tool can you use to optimize voice traffic on a network that is primarily intended for data traffic?A . WREDB . FIFOC . PQD . WFQView AnswerAnswer: C

September 21, 2021 No Comments READ MORE +

What does physical access control regulate?

What does physical access control regulate?A . access to specific networks based on business functionB . access to servers to prevent malicious activityC . access to computer networks and file systemsD . access to networking equipment and facilitiesView AnswerAnswer: D

September 21, 2021 No Comments READ MORE +

Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two)

Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two)A . TelnetB . SSHC . HTTPD . HTTPSE . TFTPView AnswerAnswer: A C

September 21, 2021 No Comments READ MORE +